Advanced Search

    column
    A Survey of Classification of Data Streams
    Wang Tao, Li Zhoujun, Yan Yuejin, Chen Huowang
    2007, 44(11): 1809-1815.
    Abstract PDF
    Multi-Dimensional Concept Lattice and Incremental Discovery of Multi-Dimensional Sequential Patterns
    Jin Yang and Zuo Wanli
    2007, 44(11): 1816-1824.
    Abstract PDF
    A Two-Order Particle Swarm Optimization Model
    Hu Jianxiu and Zeng Jianchao
    2007, 44(11): 1825-1831.
    Abstract PDF
    Iterative sIB Algorithm Based on Mutation
    Zhu Zhenfeng, Ye Yangdong, Gang Li
    2007, 44(11): 1832-1838.
    Abstract PDF
    Communication Protocol Entity Behavioral Specification and Description Language
    Fan Hao, Wu Zhehui
    2007, 44(11): 1839-1848.
    Abstract PDF
    Self-Organization Resource Topology Revolution Based on Trust Mechanism
    Wang Wei and Zeng Guosun
    2007, 44(11): 1849-1856.
    Abstract PDF
    Replacement Solutions for Streaming Cache on P2P Network
    Chen Gang, Zhang Weiwen, and Wu Guoxin
    2007, 44(11): 1857-1865.
    Abstract PDF
    A Self-Adaptive, Energy-Efficient Low Latency MAC Protocol for Wireless Sensor Network
    Gong Haigang, Yu Changyuan, Liu Ming, Yi Fasheng, Wang Xiaomin, Chen Lijun
    2007, 44(11): 1866-1872.
    Abstract PDF
    A New Service Guaranteed Scheduling Policy for Buffered Crossbar Switches
    Li Ji, Zeng Huaxin, Xu Dengyuan
    2007, 44(11): 1873-1880.
    Abstract PDF
    A Security Domain Separation Z Model Based on DTE Policy
    Qing Sihan, Li Liping, He Jianbo, Shen Qingni
    2007, 44(11): 1881-1888.
    Abstract PDF
    Transitive Trust and Performance Analysis in Windows Environment
    Li Xiaoyong, Han Zhen, Shen Changxiang
    2007, 44(11): 1889-1895.
    Abstract PDF
    A Game-Based Axiomatization of μ-Calculus
    Liu Wanwei, Wang Ji, and Chen Huowang
    2007, 44(11): 1896-1902.
    Abstract PDF
    A Game-Based Axiomatization of μ-Calculus
    Liu Wanwei, Wang Ji, and Chen Huowang
    2007, 44(11): 1896-1902.
    Abstract PDF
    An Efficient Greedy Algorithm for Schema Matching
    Zhang Zhi and Shi Pengfei
    2007, 44(11): 1903-1911.
    Abstract PDF
    A Fault-Tolerant Priority Configuration Mixed Search Algorithm
    Li Jun, Cao Wanhua, Yang Fumin, Tu Gang, Lu Yansheng, Luo Wei
    2007, 44(11): 1912-1919.
    Abstract PDF
    Gaussian Mixture Modeling of Neighbor Characters for Multilingual Text Extraction in Images
    Fu Hui, Liu Xiabi, Jia Yunde
    2007, 44(11): 1920-1926.
    Abstract PDF
    Kernel Methods for Radar Target Recognition Using Range Profiles
    Yu Xuelian, Wang Xuegang, Liu Benyong
    2007, 44(11): 1927-1931.
    Abstract PDF
    Planar Shape Blending Algorithm with Preserving Interior Similarity
    Zhang Dongmei and Liu Ligang
    2007, 44(11): 1932-1938.
    Abstract PDF
    A Genetic Algorithm for Error-Bounded Polygonal Approximation of Curves
    Wang Bin, Shu Huazhong, and Luo Limin
    2007, 44(11): 1939-1945.
    Abstract PDF
    Disposing X86 FPU Stack in Binary Translation
    Xie Haibin, Wu Chenggang, Cui Huimin, Li Jing
    2007, 44(11): 1946-1954.
    Abstract PDF
    Compatibility and Substitutability Analysis of Web Services Composition
    Shi Yuliang, Wang Haiyang, Zhang Liang, Shi Baile
    2007, 44(11): 1955-1961.
    Abstract PDF
    Error Propagation Analysis in Software
    Li Aiguo, Hong Bingrong, Wang Si, Piao Songhao
    2007, 44(11): 1962-1970.
    Abstract PDF
    Model and Algebra of Object-Relation Bitemporal Data Based on Temporal Variables
    Ye Xiaoping
    2007, 44(11): 1971-1979.
    Abstract PDF
    Indexing Bit-Code and Distance for Fast KNN Search in High-Dimensional Spaces
    Liang Junjie, Wang Changlei
    2007, 44(11): 1980-1985.
    Abstract PDF